zeronetworks / rpcfirewall
☆495Updated 2 months ago
Alternatives and similar repositories for rpcfirewall:
Users that are interested in rpcfirewall are comparing it to the libraries listed below
- A centralized resource for previously documented WDAC bypass techniques☆508Updated 10 months ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆320Updated last year
- Event Tracing For Windows (ETW) Resources☆363Updated 5 months ago
- Detect and respond to Cobalt Strike beacons using ETW.☆487Updated 2 years ago
- ☆234Updated 10 months ago
- A C# utility for interacting with SCCM☆611Updated 5 months ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆445Updated 2 years ago
- Active Directory delegation management tool☆291Updated last year
- ☆468Updated last year
- Aims to identify sleeping beacons☆569Updated 3 months ago
- ☆375Updated 2 years ago
- "Golden" certificates☆658Updated 6 months ago
- An effort to track security vendors' use of Microsoft's Antimalware Scan Interface☆242Updated 3 years ago
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆253Updated last year
- ☆757Updated last year
- ☆199Updated 4 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆233Updated this week
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆758Updated last month
- Sysmon EDR POC Build within Powershell to prove ability.☆221Updated 3 years ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆315Updated 4 months ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆476Updated last year
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆732Updated 11 months ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound, and also supports full-object dumping …☆938Updated 2 weeks ago
- Sysmon configuration file template with default high-quality event tracing☆473Updated last year
- MAL-CL (Malicious Command-Line)☆310Updated 2 years ago
- Sysmon-Like research tool for ETW☆351Updated 2 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆841Updated 3 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆457Updated 8 months ago
- A collection of tools to interact with Microsoft Security Response Center API☆95Updated last year
- Scan installed EDRs and AVs on Windows☆577Updated last year